Vulnerability Details

Huawei Data Communication: Three DoS Vulnerabilities in the SIP Module of Some Huawei Products (huawei-sa-20200115-01-sip)

Published: 2020-06-25 20:42:17
CVE Author: NIST National Vulnerability Database

CVSS Base Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Detection Type:
Remote Banner

Solution Type:
Vendor Patch

Summary:
There are three denial of service (DoS) vulnerabilities in the SIP module of some Huawei products.

Detection Method:
Checks if a vulnerable version is present on the target host.

Technical Details:
A remote attacker could exploit these three vulnerabilities by sending a specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. (Vulnerability ID: HWPSIRT-2017-03027, HWPSIRT-2017-03028 and HWPSIRT-2017-03029)

Impact:
Successful exploit of this vulnerability could lead to a DoS condition.

Affected Versions:
AR120-S versions V200R006C10 V200R007C00 V200R008C20 V200R008C30 AR1200 versions V200R006C10 V200R006C13 V200R007C00 V200R007C01 V200R007C02 V200R008C20 V200R008C30 AR1200-S versions V200R006C10 V200R007C00 V200R008C20 V200R008C30 AR150 versions V200R006C10 V200R007C00 V200R007C01 V200R007C02 V200R008C20 V200R008C30 AR150-S versions V200R006C10SPC300 V200R007C00 V200R008C20 V200R008C30 AR160 versions V200R006C10 V200R006C12 V200R007C00 V200R007C01 V200R007C02 V200R008C20 V200R008C30 AR200 versions V200R006C10 V200R007C00 V200R007C01 V200R008C20 V200R008C30 AR200-S versions V200R006C10 V200R007C00 V200R008C20 V200R008C30 AR2200 versions V200R006C10 V200R006C13 V200R006C16PWE V200R007C00 V200R007C01 V200R007C02 V200R008C20 V200R008C30 AR2200-S versions V200R006C10 V200R007C00 V200R008C20 V200R008C30 AR3200 versions V200R006C10 V200R006C11 V200R007C00 V200R007C01 V200R007C02 V200R008C00 V200R008C10 V200R008C20 V200R008C30 AR3600 versions V200R006C10 V200R007C00 V200R007C01 V200R008C20 AR510 versions V200R006C10 V200R006C12 V200R006C13 V200R006C15 V200R006C16 V200R006C17 V200R007C00SPC180T V200R007C00SPC600 V200R007C00SPC900 V200R007C00SPCb00 V200R008C20 V200R008C30 DP300 versions V500R002C00 IPS Module versions V100R001C10 V100R001C20 V100R001C30 V500R001C00 V500R001C20 V500R001C30 V500R001C50 NGFW Module versions V100R001C10 V100R001C20 V100R001C30 V500R001C00 V500R001C20 V500R002C00 V500R002C10 NIP6300 versions V500R001C00 V500R001C20 V500R001C30 V500R001C50 NIP6600 versions V500R001C00 V500R001C20 V500R001C30 V500R001C50 NIP6800 versions V500R001C30 V500R001C50 NetEngine16EX versions V200R006C10 V200R007C00 V200R008C20 V200R008C30 RSE6500 versions V500R002C00 SMC2.0 versions V100R003C00SPC200T V100R003C00SPC300T V100R003C00SPC301T V100R003C10 V100R005C00SPC100 V100R005C00SPC101B001T V100R005C00SPC102 V100R005C00SPC103 V100R005C00SPC200 V100R005C00SPC201T V500R002C00 V600R006C00 SRG1300 versions V200R006C10 V200R007C00 V200R007C02 V200R008C20 V200R008C30 SRG2300 versions V200R006C10 V200R007C00 V200R007C02 V200R008C20 V200R008C30 SRG3300 versions V200R006C10 V200R007C00 V200R008C20 V200R008C30 SVN5600 versions V200R003C00 V200R003C10 SVN5800 versions V200R003C00 V200R003C10 SVN5800-C versions V200R003C00 V200R003C10 SeMG9811 versions V300R001C01SPC500 V300R001C01SPC500T V300R001C01SPC700 V300R001C01SPCa00 Secospace USG6300 versions V100R001C10 V100R001C20 V100R001C30 V500R001C00 V500R001C20 V500R001C30 V500R001C50 Secospace USG6500 versions V100R001C10 V100R001C20 V100R001C30 V500R001C00 V500R001C20 V500R001C30 V500R001C50 Secospace USG6600 versions V100R001C00 V100R001C10 V100R001C20 V100R001C30 V500R001C00 V500R001C20 V500R001C30 V500R001C50 SoftCo versions V200R001C01SPC300 V200R001C01SPC400 V200R001C01SPC500 V200R001C01SPC600 V200R001C01SPH703 V200R003C00SPC100 V200R003C00SPC200 V200R003C00SPC300 V200R003C00SPC500 V200R003C20 TE30 versions V100R001C02SPC100 V100R001C02SPC200 V100R001C10 V500R002C00SPC200 V500R002C00SPC600 V500R002C00SPC700 V500R002C00SPC900 V500R002C00SPCb00 V600R006C00 TE40 versions V500R002C00SPC600 V500R002C00SPC700 V500R002C00SPC900 V500R002C00SPCb00 V600R006C00 TE50 versions V500R002C00SPC600 V500R002C00SPCb00 V600R006C00 TE60 versions V100R001C01SPC100 V100R001C10 V100R001C10SPC300 V100R001C10SPC400 V100R001C10SPC500 V100R001C10SPC600 V100R001C10SPC800 V100R003C00 V500R002C00 V500R002C00SPC100 V500R002C00SPC200 V500R002C00SPC300 V500R002C00SPC600 V500R002C00SPC700 V500R002C00SPC800 V500R002C00SPC900 V500R002C00SPCa00 V500R002C00SPCb00 V600R006C00 V600R006C00SPC200 TP3206 versions V100R002C00 USG9500 versions V300R001C01 V300R001C20 V500R001C00 V500R001C20 V500R001C30 V500R001C50 USG9520 versions V300R001C01SPC800PWE USG9560 versions V300R001C20SPC300 VP9660 versions V200R001C02SPC100 V200R001C02SPC200 V200R001C02SPC300 V200R001C02SPC300T V200R001C02SPC400 V200R001C30SPC100 V200R001C30SPC100B015T V200R001C30SPC101 V200R001C30SPC101TB015 V200R001C30SPC102T V200R001C30SPC103T V200R001C30SPC104T V200R001C30SPC200 V200R001C30SPC200B022T V200R001C30SPC201B023T V200R001C30SPC202B025T V200R001C30SPC203T V200R001C30SPC206T V200R001C30SPC207T V200R001C30SPC208T V200R001C30SPC209T V200R001C30SPC300 V200R001C30SPC400 V200R001C30SPC400B001 V200R001C30SPC400T V200R001C30SPC401T V200R001C30SPC402T V200R001C30SPC403T V200R001C30SPC404T V200R001C30SPC405T V200R001C30SPC600 V200R001C30SPC700 V200R001C30SPC700T V200R001C30SPC701T V200R001C30SPC702T V200R001C30SPC703T V200R001C30SPC800 V200R001C30SPC800T V200R001C30SPC900 V200R001C30SPCa00 V200R001C30SPCa00T V200R001C30SPCa01 V200R001C30SPCa01T V200R001C30SPCa02T V200R001C30SPCb00 V200R001C30SPCc00 V200R001C30SPCd00 V200R001C30SPCd00T V200R001C30SPCd01T V200R001C30SPCd02T V200R001C30SPCd03T V200R001C30SPCd04T V200R001C30SPCd05T V200R001C30SPCe00 V200R001C30SPCe01T V200R001C30SPCf00 V200R001C30SPCg00 V200R001C30SPCh00 V200R001C30SPCi00 V200R001C30SPCj00 V500R002C00 V500R002C00SPC001T V500R002C00SPC200 V500R002C00SPC200T V500R002C00SPC201T V500R002C00SPC203T V500R002C00SPC204T V500R002C00SPC205T V500R002C00SPC206T V500R002C00SPC300 V500R002C00SPC400 V500R002C00SPC500 V500R002C00SPC600 V500R002C00SPC700 V500R002C00SPC800 V500R002C00SPC900 V500R002C00SPC900T V500R002C00SPC901T V500R002C00SPCa00 V500R002C00SPCb00 V500R002C00SPCb01T V500R002C00SPCc00 V500R002C00SPCd00 V500R002C00T V500R002C10 V500R002C10SPC100 V500R002C10SPC100T V500R002C10T ViewPoint 8660 versions V100R008C03B013SP02 V100R008C03B013SP03 V100R008C03B013SP04 V100R008C03SPC100 V100R008C03SPC200 V100R008C03SPC300 V100R008C03SPC400 V100R008C03SPC500 V100R008C03SPC600 V100R008C03SPC700 V100R008C03SPC800 V100R008C03SPC900 V100R008C03SPCa00 V100R008C03SPCb00 V100R008C03SPCc00 ViewPoint 9030 versions V100R011C02SPC100 V100R011C03B012SP15 V100R011C03B012SP16 V100R011C03B015SP03 V100R011C03LGWL01SPC100 V100R011C03LGWL01SPC100B012 V100R011C03SPC100 V100R011C03SPC200 V100R011C03SPC300 V100R011C03SPC400 V100R011C03SPC500 eSpace U1910 versions V100R001C20SPC300 V100R001C20SPC400 V100R001C20SPC500 V100R001C20SPC600 V100R001C20SPH703 V200R003C00 V200R003C20 V200R003C30 eSpace U1911 versions V100R001C20SPC300 V100R001C20SPC400 V100R001C20SPC500 V100R001C20SPC600 V100R001C20SPH309 V100R001C20SPH703 V200R003C00 V200R003C20 V200R003C30 eSpace U1930 versions V100R001C20SPC300 V100R001C20SPC400 V100R001C20SPC500 V100R001C20SPC600 V100R001C20SPH703 V200R003C00 V200R003C20 V200R003C30 eSpace U1960 versions V100R001C01SPC500 V100R001C20LCRW01T V100R001C20SPC300 V100R001C20SPC400 V100R001C20SPC600 V100R001C20SPC600T V100R001C20SPH309 V100R001C20SPH703 V200R003C00 V200R003C20 V200R003C30 eSpace U1980 versions V100R001C01SPC500T V100R001C20SPC300 V100R001C20SPC400 V100R001C20SPC500T V100R001C20SPC502 V100R001C20SPC600 V100R001C20SPH309 V100R001C20SPH703 V200R003C00 V200R003C20 V200R003C30 eSpace U1981 versions V100R001C20SPC300 V100R001C20SPC400 V100R001C20SPC500 V100R001C20SPC600 V100R001C20SPC700 V100R001C20SPH702 V100R001C20SPH703 V100R001C30 V200R003C00 V200R003C20 V200R003C30.

Recommendations:
See the referenced vendor advisory for a solution.

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2019-19415
https://nvd.nist.gov/vuln/detail/CVE-2019-19416
https://nvd.nist.gov/vuln/detail/CVE-2019-19417

References:

https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en

Severity
Medium
CVSS Score
5.0
Published
2020-06-25
Modified
2020-07-01
Category
Huawei

Free Vulnerability Scanning, Assessment and Management

Mageni's Platform is packed with all the features you need to scan, assess and manage vulnerabilities like this - it is free, open source, lightning fast, reliable and scalable.

Router
Servers
Laptop
Database
Group
Cloud

Frequently Asked Questions

No, you can scan concurrently as many assets as you want. Please note that you must be aware of the hardware requeriments of the platform to ensure a good performance.

No, you can add as many assest as you want. It doesn't matters if you have millions of assets, we won't charge you for that.

No. The software is completely free. We have no intention to charge you to use the software, in fact - it completely goes against our beliefs and business model.

A vulnerability is defined in the ISO 27002 standard as “A weakness of an asset or group of assets that can be exploited by one or more threats” (International Organization for Standardization, 2005)

We generate revenue by providing support and other services for customers that require a subscription so they get guaranteed support and enterprise services. To use Mageni's Platform is completely free, with no limits at all.

Yes. Mageni understands that there are professionals and businesses that need commercial support so Mageni provides an active support subscription with everything needed to run Mageni's Platform reliably and securely. More than software, it's access to security experts, knowledge resources, security updates, and support tools you can't get anywhere else. The subscription includes:

  • Ongoing delivery
    • Patches
    • Bug fixes
    • Updates
    • Upgrades
  • Technical support
    • 24/7 availability
    • Unlimited Incidents
    • Specialty-based routing
    • Multi-Channel
  • Commitments
    • Software certifications
    • Software assurance
    • SLA

No, we don't store the information of your vulnerabilities in our servers.

Vulnerability management is the process in which vulnerabilities in IT are identified and the risks of these vulnerabilities are evaluated. This evaluation leads to correcting the vulnerabilities and removing the risk or a formal risk acceptance by the management of an organization. The term vulnerability management is often confused with vulnerability scanning. Despite the fact both are related, there is an important difference between the two. Vulnerability scanning consists of using a computer program to identify vulnerabilities in networks, computer infrastructure or applications. Vulnerability management is the process surrounding vulnerability scanning, also taking into account other aspects such as risk acceptance, remediation etc. Source: "Implementing a Vulnerability Management Process". SANS Institute.

I am ready to start scanning for vulnerabilities